security
Your industrial network doesn’t have to be a scary movie
Another Halloween is upon us, and jack o’lanterns, ghosts, and diabolical clowns are springing up everywhere. October is also National Cybersecurity Month—another reminder that the world can be a frightening place, with sophisticated new attacks on a regular basis.…
Cybersecurity and the Federal Government – GovLoop’s Latest Guide Features Cisco
It seems like everyone is concerned about cybersecurity these days, but the stakes are especially high for the federal government. For good reason, as the public sector’s networks and data in question contain some of our nation’s most important and most sensitive information. But the technology land…
The risk of doing nothing
Source: Edreformnow.org Have you ever told your team, “Upgrading our equipment is too expensive and likely to cause downtime. Let’s just keep it running.” Ultimately, you made a risk decision. While cyber security hasn’t been a critical risk factor until recently, it has quickly emerged as one of to…
Connections: Vulnerabilities? Or Advantages?
When is the last time that you didn’t update the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker from Talos asked us the same question. A small number of people rais…
Mission-Driven Cybersecurity
For many government agencies, cybersecurity can be an afterthought, a one-off, single product they add on after the fact to meet regulation or protect from basic hacks. What these agencies don’t realize is that cybersecurity isn’t an afterthought – it’s closely tied to an agency’s core mission. Whet…
Join us at EDUCAUSE to Learn How to Constrain Cyber Attackers
Like Renee Patton who is Gearing up for EDUCAUSE 2016, I am equally thrilled to be co-presenting with Bruce Maas and Bob Turner from the University of Wisconsin – Madison. Our session, Effective Threat Detection: The Key to Constraining Our Attackers on Thursday October 27th from 8 to 8:50 am, will…
Upskill on Cybersecurity in a Virtual World
Submitted by Kelsey Kusterer Ziser, the Editor of Upskill U at Light Reading As service providers migrate traditional networks to virtualized networks, it’s no longer enough to only secure the perimeter. Threats from within the network are on the rise as hackers increasingly have access to mor…
Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee
During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose secur…
How to Digitize: Create a Culture of Agility
In my previous blog, I discussed the most common question I receive, “How do I begin the digitization journey for my company?” The next question is often, “How do we change our corporate culture?” Corporate culture is key to the success or failure of digital business transformation. From my conversa…